A Survey on Trust-based Intrusion Detection for Version Number Attack on RPL
Hiral Patel1 , Hiren Patel2 , Bela Shrimali3
Section:Survey Paper, Product Type: Journal Paper
Volume-6 ,
Issue-10 , Page no. 449-454, Oct-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i10.449454
Online published on Oct 31, 2018
Copyright © Hiral Patel, Hiren Patel, Bela Shrimali . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Hiral Patel, Hiren Patel, Bela Shrimali, “A Survey on Trust-based Intrusion Detection for Version Number Attack on RPL,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.10, pp.449-454, 2018.
MLA Style Citation: Hiral Patel, Hiren Patel, Bela Shrimali "A Survey on Trust-based Intrusion Detection for Version Number Attack on RPL." International Journal of Computer Sciences and Engineering 6.10 (2018): 449-454.
APA Style Citation: Hiral Patel, Hiren Patel, Bela Shrimali, (2018). A Survey on Trust-based Intrusion Detection for Version Number Attack on RPL. International Journal of Computer Sciences and Engineering, 6(10), 449-454.
BibTex Style Citation:
@article{Patel_2018,
author = {Hiral Patel, Hiren Patel, Bela Shrimali},
title = {A Survey on Trust-based Intrusion Detection for Version Number Attack on RPL},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {10 2018},
volume = {6},
Issue = {10},
month = {10},
year = {2018},
issn = {2347-2693},
pages = {449-454},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3045},
doi = {https://doi.org/10.26438/ijcse/v6i10.449454}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i10.449454}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3045
TI - A Survey on Trust-based Intrusion Detection for Version Number Attack on RPL
T2 - International Journal of Computer Sciences and Engineering
AU - Hiral Patel, Hiren Patel, Bela Shrimali
PY - 2018
DA - 2018/10/31
PB - IJCSE, Indore, INDIA
SP - 449-454
IS - 10
VL - 6
SN - 2347-2693
ER -
VIEWS | XML | |
540 | 358 downloads | 241 downloads |
Abstract
The IoT incorporates the network of physical devices (things) that are connected to the global Internet for transferring and performing computation in lager application area. Routing protocols are designed for Low Power and Lossy network (RPL) to support communication in the constrained network with thousands of such power-scarce nodes in IoT. Consequently, due to the increases in millions and billions of connected devices in the constraint network(s) all over the world, security has become the aspect of most significance. Lightweight Intrusion Detection System (IDS) is required to examine the malicious activity and malicious node in the network of IoT, to filter out different attacks in a resource-constrained environment. In this paper, the lightweight trust based intrusion detection methods covering the different attacks of the wireless sensor network and IoT are reviewed and discussed. This article may give the direction to the beginners to identify appropriate methods and observations for their future research in the application domain of IoT.
Key-Words / Index Term
IoT, RPL, security, attacks, Trust-based, intrusion detation
References
[1] H.D. Ma., “Internet of things: Objectives and scientific challenges”, Journal of Computer science and Technology, Vol. 26(6), pp.919–924, 2011.
[2] L. Patra, U.P. Rao, “Internet of Things - Architecture, applications, security and other major challenges”, 2016 3rd International Conference on Computing for Sustainable Global Development, New Delhi, pp. 1201-1206, 2016.
[3] T. Winter, P. Thubert, A. Brandt, J. Hui, R. Kelsey, P. Levis, K. Pister, R. Struik, J. Vasseur, and R. Alexander, “RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks”, RFC 6550, Internet Engineering Task Force, 2012.
[4] L. Wallgren, S. Raza, T. Voigt, “Routing Attacks and Countermeasures in the RPL-based Internet of Things” International Journal of Distributed Sensor Networks, Vol. 9(8), p. 794326, 2013.
[5] B.A. Alabsi, M. Anbar, S. anickam, “A Comprehensive Review on Security Attacks in Dynamic Wireless Sensor Networks based on RPL protocol”, International Journal of Pure and Applied Mathematics, Vol.118, pp. 653-667, 2018.
[6] D. Shreenivas, S. Raza, T. Voigt, “Intrusion Detection in the RPL-connected 6LoWPAN Networks”, ACM International Workshop on IoT Privacy, Trust and Security, pp. 31 – 38, 2017.
[7] D. Airehrour, “A Trust-based Routing Framework for the Internet of Things”, PhD Diss, Auckland University of Technology, 2017.
[8] H.S. Kim, J. Ko, D.E. Culler, J. Paek, “Challenging the IPv6 Routing Protocol for Low Power and Lossy Networks (RPL): A Survey”, IEEE Communications Suveys and Tutorials, Vol. 19, No. 4, pp. 2502 –2525, 2017.
[9] M. Kaur, A. Mohd Aslam, “Big Data Analytics on IOT: Challenges, Open Research Issues and Tools”, International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.3, pp.81-85, 2018.
[10] C. Bekara, “Security Issues and Challenges for the IoT-based Smart Grid”, International Workshop on Communicating Objects and Machine to Machine for Mission Critical Application, Elsevier, pp. 532 – 537, 2014.
[11] P. Manickam, V. Muthu Ganeshan, M. Girija, “Comprehensive Approach in Studying the Behaviour of Contiki RPL Protocol in Diverse Data Transmission Ranges”, International Journal of Scientific Research in Network Security and Communication, Vol. 6, Issue. 3, pp. 37-42, 2018.
[12] A. Mayzaud , R. Badonnel, I. Chrismen, “A Taxonomy of Attacks in RPL-based Internet of Things”, International Journal of Network Security, Vol.18, No. 3, pp. 459 – 473, 2016.
[13] R. Mehta, M.M. Parmar, “A Survey on Security Attacks and Countermeasures in RPL for Internet of Things”, International Journal of Advance Research in Science and Engineering, Vol. 7, No. 3, 2018.
[14] A. Mayzaud, R. Badonnel, I. Chrisment, “A Distributed Monitoring Strategy for Detecting Version Number Attacks in RPL-Based Networks”, IEEE Transactions on Network and Service Management, Vol. 14, No. 2, pp. 472-486, 2017.
[15] A. Dvir, T. Holczer, L. Buttyan, “VeRA - Version Number and Rank Authentication in RPL”, 2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems, Valencia, pp. 709-714, 2011.
[16] F. Ahmed, Y.B. Ko, “A Distributed and Cooperative Verification Mechanism to Defend against DODAGVersion Number Attack in RPL”, International joint conference on Pervasive and Embedded Computing and Communication systems, Vol. 1, pp. 55–62, 2016.
[17] M. Nikravan, A. Moaghar, M. Hosseinzadeh, “A Lightweight Defense Approach to Mitigate Version Number and Rank Attacks in Low-Power and Lossy Networks”, Wireless Personal Communications, Springer, pp. 1 –25, 2018.
[18] C.R. Perez-Toro, R.K. Panta, S. Bagchi, “RDAS: Reputation-Based Resilient Data Aggregation in Sensor Network”, 2010 7th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), Boston, MA, pp. 1-9, 2010.
[19] N. Djedjig, D. Tandjaoui, F. Medjek, “Trust-based rpl for the Internet of things”, in 2015 IEEE Symposium on Computers and Communication (ISCC). IEEE, pp. 962–967, 2015.
[20] N. Djedjig, D. Tandjaoui, F. Medjek, I. Romdhani, “New trust metric for the rpl routing protocol”, in 2017 IEEE The 8th International Conference on Information and Communication Systems (ICICS). IEEE, 2017.
[21] Z.A. Khan, P. Herrmann, “A Trust Based Distributed Intrusion Detection Mechanism for Internet of Things”, 2017 IEEE 31st International Conference on Advanced Information Networking and Applications (AINA), Taipei, pp. 1169-1176, 2017.
[22] F. Nygaard , “Intrusion Detection System In IoT”, Master`s thesis, NTNU, 2017.
[23] D. Airehrour, J. Gutierrez, S.K. Ray, “A Trust-Aware RPL Routing Protocol to Detect Blackhole and Selective Forwarding Attacks”, Australian Journal of Telecommunications and the Digital Economy, vol. 5, April 2017.
[24] F. Medjek, D. Tandjaoui, I. Romdhani, N. Djedjig, “A Trust-Based Intrusion Detection System for Mobile RPL Based Networks”, 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Exeter, pp. 735-742, 2017.
[25] J. Caminha, A. Perkusich, M. Perkusich, “A Smart Trust Management Method to Detect On-Off Attacks in the Internet of Things”, Security and Communication Networks, pp.10, 2018.
[26] A. Mayzaud, R. Badonnel, I. Chrisment, “Monitoring and Security for the RPL-based Internet of Things”, Doctoral dissertation, University de Lorraine, 2016.
[27] A. Aris, S. F. Oktug, S. Berna Ors Yalcin, “RPL version number attacks: In-depth study”, NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium, Istanbul, pp. 776-779, 2016.